HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Wedge Networks BeSecure Uses Deep Content Inspection to Protect Against Malware

Wedge Networks LogoMalware authors are increasingly targeting a wide array of devices, as evident with recent news of malware infestation in Google's Android Market. While smartphone and tablet security software are only starting to become popular among consumers, Wedge Networks has a solution that will address malicious sofware at its source.

Wedge Networks' BeSecure is a web security appliance that will ensure that content delivered is free of viruses and other security threats. Meant for mobile and online content providers, BeSecure goes beyond conventional deep content inspection, with a scalable, real-time solution that can detect and fight against malware and attacks that steal data and slow down networks.

Suitable for Mobile, Content Providers, Cloud Computing

In an interview with CMSWire, Wedge Networks CEO Hongwen Zhang cited the need for anti-malware solutions that are easy to integrate into existing environments. He says BeSecure is an ideal solution as it addresses malware at the content level.

BeSecure's deep-content inspection is a technology deployed on the network, to ensure data is secure both when content flows in and out. This includes content delivery mechanisms for applications, such as app stores and app marketplaces. BeSecure will ensure that there is no malicious content that will arrive at the end-user's device."

Zhang adds that cloud providers are a particularly suitable environment for deploying BeSecure.

Typically, cloud deployments are mission-critical applications with rigid requirements. These services require high security, and a high level of reliability. This is where BeSecure shines, as it enforces security without sacrificing performance."

Frequent Updates, Multiple Malware Detection Technologies

BeSecure's feature set includes the following:

  • Full Deep Content Inspection for various protocols and apps, including HTTP, FTP, email and others, including apps meant for different OSes
  • Behavioral analysis on web, email and FTP traffic, which provides inline-threat detection for webmail attachments, applications, software downloads and similar items
  • Consolidation of multiple threat intelligence sources across communication protocols to stop malware regardless of its activation point
  • High bandwidth with low latency malware scanning to deploy into busy networks and uphold service level agreements
  • Inbound and outbound security filtering to provide defense before content hits the internal network and malicious code propagates the consumer space
  • A network based, anti-malware and anti-spam solution for multiple devices including mobile phones, tablets, PDAs and PCs

Zhang says that the underlying technology behind BeSecure includes different types of checks to ensure the integrity of content. This includes monitoring content in the middle of the traffic stream, signature matches, MIME type matching, object scanning, real-time heuristics analysis and real-time matching. This also includes analysis of the content to determine whether it wants to destroy data, steal data, or simply cause headaches to the user or network adminsitrator.

BeSecure updates its malware signatures hourly to ensure that any new threat is added to the security appliances the company has deployed. BeSecure also works as an anti-spam mechanism. Rather than being IP-based, BeSecure's spam filters are deep-content based, and are updated every 45 seconds.

How Bad Is Malware in Mobile Devices?

Google itself has admitted that a few dozen apps in the Android Market have been hiding in the guise of legitimate software, but are, in fact, stealing data from users and calling premium numbers at cost to users. These malicious apps have since been remotely deactivated, but for some, the damage has been done. Meanwhile, Juniper Networks' Global Threat Center pegs malware growth at 250% in the past year, with 61% accounting for spyware. With individuals moving their digital identities into mobile devices, the concept of your data being stolen from your smartphone or tablet is increasingly becoming scary.

 
 
 
Useful article?
  Email It      

Tags: , , , , , , , , , , ,
 
 

Resources

 

Featured Events  View All Events | Add Your Event | feed Events RSS